An unnamed university’s own connected devices were infected and launched a DDoS Attack on its infrastructure and shut down the internet. The institution reached out to Verizon RISK (Research, Investigations, Solutions and Knowledge), which analyzed the DNS and firewall logs.
Some 5,000 devices, including vending machines and streetlamps, were reprogrammed to regularly connect to seafood subdomains. One a vulnerable device was compromised, the rest followed, domino-style, because they were all part of the same infected network.
“The firewall analysis identified over 5,000 discrete systems making hundreds of DNS lookups every 15 minutes,” reads the Verizon summary. “The botnet spread from device to device by brute forcing default and weak passwords.”
The university’s IT department worked fast to reset the new passwords the attacker used for the devices, as they were not encrypted and only in clear-text format.
Inadequate security turns IoT devices into easy prey for cybercriminals. Security expects have warned that, following the massive 2016 Mirai DDoS attacks, 2017 would see an increase in IoT-related attacks.
Hopefully this incident will serve as another warning for organizations to take extra security measures to prevent such situations in the future.
Following the investigation, Verizon advises institutions to “create separate network zones for IoT systems and air-gap them from other critical networks where possible.”